Lookup for vulnerable packages by Package URL.

Purlpkg:alpm/archlinux/gitlab@13.11.3-1
Typealpm
Namespacearchlinux
Namegitlab
Version13.11.3-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version13.12.2-1
Latest_non_vulnerable_version15.2.1-1
Affected_by_vulnerabilities
0
url VCID-3gk7-f7rw-s3bt
vulnerability_id VCID-3gk7-f7rw-s3bt
summary An issue has been discovered in GitLab affecting all versions starting with 13.10. GitLab was vulnerable to a stored XSS in blob viewer of notebooks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22220
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35278
published_at 2026-04-24T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35418
published_at 2026-04-01T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35618
published_at 2026-04-02T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35643
published_at 2026-04-04T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35525
published_at 2026-04-07T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35571
published_at 2026-04-08T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35595
published_at 2026-04-09T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35605
published_at 2026-04-11T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35561
published_at 2026-04-12T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35538
published_at 2026-04-13T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35577
published_at 2026-04-16T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.35567
published_at 2026-04-18T12:55:00Z
12
value 0.0015
scoring_system epss
scoring_elements 0.35516
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22220
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22220
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gk7-f7rw-s3bt
1
url VCID-8ahg-hgub-43b5
vulnerability_id VCID-8ahg-hgub-43b5
summary A denial of service vulnerability in all versions of GitLab CE/EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a specially crafted issue or merge request
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22217
reference_id
reference_type
scores
0
value 0.0068
scoring_system epss
scoring_elements 0.71649
published_at 2026-04-24T12:55:00Z
1
value 0.0068
scoring_system epss
scoring_elements 0.71532
published_at 2026-04-01T12:55:00Z
2
value 0.0068
scoring_system epss
scoring_elements 0.71539
published_at 2026-04-02T12:55:00Z
3
value 0.0068
scoring_system epss
scoring_elements 0.71557
published_at 2026-04-04T12:55:00Z
4
value 0.0068
scoring_system epss
scoring_elements 0.7153
published_at 2026-04-07T12:55:00Z
5
value 0.0068
scoring_system epss
scoring_elements 0.7157
published_at 2026-04-08T12:55:00Z
6
value 0.0068
scoring_system epss
scoring_elements 0.71581
published_at 2026-04-09T12:55:00Z
7
value 0.0068
scoring_system epss
scoring_elements 0.71603
published_at 2026-04-11T12:55:00Z
8
value 0.0068
scoring_system epss
scoring_elements 0.71588
published_at 2026-04-12T12:55:00Z
9
value 0.0068
scoring_system epss
scoring_elements 0.71569
published_at 2026-04-13T12:55:00Z
10
value 0.0068
scoring_system epss
scoring_elements 0.71614
published_at 2026-04-16T12:55:00Z
11
value 0.0068
scoring_system epss
scoring_elements 0.71619
published_at 2026-04-18T12:55:00Z
12
value 0.0068
scoring_system epss
scoring_elements 0.71599
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22217
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22217
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ahg-hgub-43b5
2
url VCID-bakk-7gzs-sfd8
vulnerability_id VCID-bakk-7gzs-sfd8
summary A denial of service vulnerability in GitLab CE/EE affecting all versions since 11.8 allows an attacker to create a recursive pipeline relationship and exhaust resources.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22181
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.3811
published_at 2026-04-24T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38269
published_at 2026-04-01T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38405
published_at 2026-04-02T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38428
published_at 2026-04-04T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38292
published_at 2026-04-07T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38343
published_at 2026-04-08T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38351
published_at 2026-04-09T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38368
published_at 2026-04-11T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38331
published_at 2026-04-12T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38306
published_at 2026-04-13T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38354
published_at 2026-04-16T12:55:00Z
11
value 0.00171
scoring_system epss
scoring_elements 0.38332
published_at 2026-04-18T12:55:00Z
12
value 0.00171
scoring_system epss
scoring_elements 0.38268
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22181
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22181
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bakk-7gzs-sfd8
3
url VCID-k29f-m5ey-f3d6
vulnerability_id VCID-k29f-m5ey-f3d6
summary All versions of GitLab CE/EE starting from 12.8 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 were affected by an issue in the handling of x509 certificates that could be used to spoof author of signed commits.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22218
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31477
published_at 2026-04-24T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31672
published_at 2026-04-01T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31804
published_at 2026-04-02T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31848
published_at 2026-04-04T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-07T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31719
published_at 2026-04-08T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31749
published_at 2026-04-09T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31752
published_at 2026-04-11T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31712
published_at 2026-04-12T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31677
published_at 2026-04-13T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31709
published_at 2026-04-16T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31687
published_at 2026-04-18T12:55:00Z
12
value 0.00125
scoring_system epss
scoring_elements 0.31654
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22218
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22218
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k29f-m5ey-f3d6
4
url VCID-kbpk-h81g-g7dr
vulnerability_id VCID-kbpk-h81g-g7dr
summary An information disclosure vulnerability in GitLab EE versions 13.11 and later allowed a project owner to leak information about the members' on-call rotations in other projects
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22215
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42312
published_at 2026-04-24T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42371
published_at 2026-04-01T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42442
published_at 2026-04-02T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42471
published_at 2026-04-04T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.4241
published_at 2026-04-07T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42461
published_at 2026-04-08T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42468
published_at 2026-04-09T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.4249
published_at 2026-04-11T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42453
published_at 2026-04-12T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.42423
published_at 2026-04-13T12:55:00Z
10
value 0.00203
scoring_system epss
scoring_elements 0.42472
published_at 2026-04-16T12:55:00Z
11
value 0.00203
scoring_system epss
scoring_elements 0.42447
published_at 2026-04-18T12:55:00Z
12
value 0.00203
scoring_system epss
scoring_elements 0.42376
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22215
1
reference_url https://security.archlinux.org/AVG-2045
reference_id AVG-2045
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2045
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22215
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbpk-h81g-g7dr
5
url VCID-n7d2-p93t-73fg
vulnerability_id VCID-n7d2-p93t-73fg
summary All versions of GitLab CE/EE starting from 9.5 before 13.10.5, all versions starting from 13.11 before 13.11.5, and all versions starting from 13.12 before 13.12.2 allow a high privilege user to obtain sensitive information from log files because the sensitive information was not correctly registered for log masking.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22219
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-24T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43055
published_at 2026-04-01T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43113
published_at 2026-04-02T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43141
published_at 2026-04-04T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-07T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43133
published_at 2026-04-12T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43145
published_at 2026-04-09T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43166
published_at 2026-04-11T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43118
published_at 2026-04-13T12:55:00Z
9
value 0.00207
scoring_system epss
scoring_elements 0.43179
published_at 2026-04-16T12:55:00Z
10
value 0.00207
scoring_system epss
scoring_elements 0.43168
published_at 2026-04-18T12:55:00Z
11
value 0.00207
scoring_system epss
scoring_elements 0.43102
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22219
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22219
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7d2-p93t-73fg
6
url VCID-n83t-8xmt-q7cs
vulnerability_id VCID-n83t-8xmt-q7cs
summary When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab CE/EE affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is limited
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22214
reference_id
reference_type
scores
0
value 0.92676
scoring_system epss
scoring_elements 0.99752
published_at 2026-04-24T12:55:00Z
1
value 0.92676
scoring_system epss
scoring_elements 0.9975
published_at 2026-04-21T12:55:00Z
2
value 0.93431
scoring_system epss
scoring_elements 0.99815
published_at 2026-04-04T12:55:00Z
3
value 0.93431
scoring_system epss
scoring_elements 0.99817
published_at 2026-04-13T12:55:00Z
4
value 0.93431
scoring_system epss
scoring_elements 0.99816
published_at 2026-04-09T12:55:00Z
5
value 0.9357
scoring_system epss
scoring_elements 0.99833
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22214
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22214
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n83t-8xmt-q7cs
7
url VCID-s8ds-5b7r-gfed
vulnerability_id VCID-s8ds-5b7r-gfed
summary A cross-site leak vulnerability in the OAuth flow of all versions of GitLab CE/EE since 7.10 allowed an attacker to leak an OAuth access token by getting the victim to visit a malicious page with Safari
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22213
reference_id
reference_type
scores
0
value 0.0096
scoring_system epss
scoring_elements 0.76534
published_at 2026-04-24T12:55:00Z
1
value 0.0096
scoring_system epss
scoring_elements 0.76409
published_at 2026-04-01T12:55:00Z
2
value 0.0096
scoring_system epss
scoring_elements 0.76412
published_at 2026-04-02T12:55:00Z
3
value 0.0096
scoring_system epss
scoring_elements 0.7644
published_at 2026-04-04T12:55:00Z
4
value 0.0096
scoring_system epss
scoring_elements 0.76422
published_at 2026-04-07T12:55:00Z
5
value 0.0096
scoring_system epss
scoring_elements 0.76454
published_at 2026-04-08T12:55:00Z
6
value 0.0096
scoring_system epss
scoring_elements 0.76468
published_at 2026-04-13T12:55:00Z
7
value 0.0096
scoring_system epss
scoring_elements 0.76494
published_at 2026-04-11T12:55:00Z
8
value 0.0096
scoring_system epss
scoring_elements 0.76472
published_at 2026-04-12T12:55:00Z
9
value 0.0096
scoring_system epss
scoring_elements 0.76508
published_at 2026-04-16T12:55:00Z
10
value 0.0096
scoring_system epss
scoring_elements 0.76512
published_at 2026-04-18T12:55:00Z
11
value 0.0096
scoring_system epss
scoring_elements 0.765
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22213
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22213
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s8ds-5b7r-gfed
8
url VCID-t5qj-bzm5-5qhe
vulnerability_id VCID-t5qj-bzm5-5qhe
summary An issue has been discovered in GitLab affecting all versions starting from 12.9.0 before 13.10.5, all versions starting from 13.11.0 before 13.11.5, all versions starting from 13.12.0 before 13.12.2. Insufficient expired password validation in various operations allow user to maintain limited access after their password expired
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22221
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40578
published_at 2026-04-24T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40679
published_at 2026-04-01T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40763
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.4079
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40714
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40764
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40771
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40756
published_at 2026-04-12T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40737
published_at 2026-04-13T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40781
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40752
published_at 2026-04-18T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40674
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22221
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22221
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5qj-bzm5-5qhe
9
url VCID-y93u-mrdn-abe3
vulnerability_id VCID-y93u-mrdn-abe3
summary A denial of service vulnerability in all versions of GitLab CE/EE before 13.12.2, 13.11.5 or 13.10.5 allows an attacker to cause uncontrolled resource consumption with a very long issue or merge request description
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22216
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38122
published_at 2026-04-24T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.3828
published_at 2026-04-01T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38418
published_at 2026-04-02T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38442
published_at 2026-04-04T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38306
published_at 2026-04-07T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38356
published_at 2026-04-08T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38364
published_at 2026-04-09T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38381
published_at 2026-04-11T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38343
published_at 2026-04-12T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.38318
published_at 2026-04-13T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38366
published_at 2026-04-16T12:55:00Z
11
value 0.00171
scoring_system epss
scoring_elements 0.38346
published_at 2026-04-18T12:55:00Z
12
value 0.00171
scoring_system epss
scoring_elements 0.38281
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22216
1
reference_url https://security.archlinux.org/ASA-202106-21
reference_id ASA-202106-21
reference_type
scores
url https://security.archlinux.org/ASA-202106-21
2
reference_url https://security.archlinux.org/AVG-2023
reference_id AVG-2023
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2023
fixed_packages
0
url pkg:alpm/archlinux/gitlab@13.12.2-1
purl pkg:alpm/archlinux/gitlab@13.12.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.12.2-1
aliases CVE-2021-22216
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y93u-mrdn-abe3
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/gitlab@13.11.3-1